Exploiting database technologies for Digital Libraries

Size: px
Start display at page:

Download "Exploiting database technologies for Digital Libraries"

Transcription

1 Exploiting database technologies for Digital Libraries Joshua W. Hui Ajay Sood Mahadevan Subramanian Parag V. Tijare IBM Almaden Research Center, San Jose, CA {jhui, ajay, maha, ABSTRACT Management of content within a Digital Library system should address the issues of access control, integrity and recovery among other things, for both structured and semi-structured data. Most vendors either address the above issues in a custom fashion or do not address them at all. Our approach is to provide a Relational Database Management System (RDBMS) solution to the above issues. We take full advantage of the RDBMS capabilities of access control, integrity and recovery for structured data and extend the RDBMS to support the same for semi-structured data through a technology called DataLinks [7]. DataLinks extends Database technology to data residing outside of the database. Administrative tasks become simpler in a Digital Library System using the DataLinks technology. This paper describes how DataLinks feature within an RDBMS would benefit a Digital Library System in managing its content. Keywords RDBMS, access control, integrity, recovery and replication 1. INTRODUCTION Digital Libraries manage wide variety of digital information like text, video, audio, images and so on. The major usage is in the management of semi-structured data which forms about eightyfive percent of the world s data [1]. The other fifteen percent is the structured data which is traditionally managed by a Relational Database Management System (RDBMS). The digital libraries, for example, can help you store, search, disseminate and protect all the scanned insurance policies in the premises of an insurance agency. A RDBMS will be more typically used by a retailer to maintain the catalog numbers and their price information. In a typical digital library architecture, the module helping with the storage and management of the actual data could be termed as the Content Management System (CMS). One of the common architectures representing a CMS is the Triangle Architecture in Figure 1. Blank section for copyright Typically, it consists of metadata server and resource manager(s). Metadata Server Client Figure 1:The Triangle Architecture Resource Manager The metadata server contains all the index information for all the objects in the resource manager. This meta information helps in management issues like protection, authentication, easier search and storage management of the digital resources. Resource manager contains the actual objects like the images, documents or the video clips and serves the content to the client. The metadata server is typically an RDBMS. The resource manager in a number of scenarios is a file system with the resources in file formats. The flow of information in Figure 1 is as follows Client submits a query to the metadata server. The metadata server serves the request if the client provides the necessary authentication information. Now there are two possibilities for retrieving the objects from the resource manager 1. metadata server tells the resource manager to push the object to the client 2. Client gets the object locator information from the metadata server and extracts the object from the resource manager For example in IBM s digital library product, Content Manager, option 1 is being followed. This paper will focus on the following functions of Content Management Systems: Update Support - This involves updating the objects in the resource manager, like creating, updating or deleting documents,

2 and be able to maintain consistency with respect to the metadata server. This brings in the questions of integrity, distributed transaction management and coordinated recovery between the resource manager and the metadata server. For example, creating and deleting a document and the corresponding metadata should happen as a single unit of work to avoid problem of dangling references. Similarly, update to the resource and metadata should be synchronized. The question of synchronized backup and recovery becomes important if we want to recover the versions of resources pointed to by the snapshot of the metadata server. Access control - Access control refers to the level of access to the resources in the resource manager. Client could be granted access to the resources based on rules built into the metadata rather than relying entirely on the security provided by a resource manager. This issue becomes particularly relevant when a client is pulling objects from the resource manager rather than resource manager pushing objects to the client. For example, in a web environment, digital libraries could adapt so that clients are able to request for objects from the resource managers. Till date, many Content Management Systems have either not addressed the above requirements or have built custom solutions which handle the issues to a varying degree. For example in IBM Content Manager, synchronized backup and recovery are not supported in the current release. To our knowledge, none of the problems have been addressed using the RDBMS. All the capabilities like recovery, integrity and access control are essentially available in a RDBMS and seems logical that RDBMS be enhanced to extend this functionality to manage the semi-structured data so that the user feels that semistructured data is part of the RDBMS although it is actually residing outside the RDBMS. This way administrative control becomes easier and the metadata server and the resource manager need not be managed through separate solutions. By using the capabilities and advances in RDBMS technology, CMS vendors do not have to rely on closed solutions. DataLinks is one such technology which helps extend the reach of a RDBMS to the outside data as if they were one single entity. DataLinks is an SQL standard [4] and could potentially be made available by any RDBMS vendor. This helps build a standard platform for the above mentioned requirements. Section 2 describes the basics of the DataLinks Technology available in IBM DB2 UDB Universal DataBase (DB2 UDB). Section 3 describes how content management systems benefit from using the DataLinks technology. The subsequent section talks about future directions and we conclude in Section DATALINKS TECHNOLOGY IN THE IBM DB2 UNIVERSAL DATABASE DataLinks is a technology invented at IBM Almaden Research Center. It is available in IBM DB2 Universal DataBase (DB2 UDB) and was first introduced in it's Version 5.2. It extends RDBMS to manage semi-structured or unstructured data residing outside the RDBMS. Traditional RDBMSs deal with structured data and provide integrity, recovery and access control for such data. DataLinks technology enables RDBMS to provide these capabilities for semi-structured data without needing to import it into the RDBMS. By storing references to semi-structured data in SQL tables in RDBMS, the above capabilities can be extended to the referenced data. Semi-structured or unstructured data, such as, documents, images, video clips, messages, engineering drawings, presentations and other business formats, typically resides in file systems. Access performance, streaming requirements, proximity to client and popularity of file system API are some reasons why such data will continue to reside in file systems rather than being moved to databases [2]. However, these files are often related in some way to structured data stored in RDBMS. A typical example is photograph of a product stored in a file and its inventory information stored in the database. Since the data is managed by two distinct systems (RDBMS and file system), there is a need to synchronize updates and backup and recovery to avoid inconsistencies. For example, the file data may get updated without updating the corresponding database data, a file may be deleted without deleting the database data or the database data may be restored to an older point in time, while the file data continues to reflect the current point in time. Thus it is necessary to coordinate various functions between RDBMS and file system. DataLinks uses distributed transaction management and recovery techniques to provide this coordination. It does not require applications to change the way they access files, that is, applications still continue to use the standard file system interface. DataLinks consists of two main components: extensions to the DB2 UDB engine (hereafter called datalink engine) and DB2 UDB Data Links Manager (DLM). The datalink engine resides where the database is located. The Data Links Manager resides SQL Access Path DB2 UDB engine with datalink engine on database server DB2 Application Control Path for DML and Utilities Standard File Access Protocol DLFF (Data Link Filesystem Filter) Native File System: JFS, NTFS, Solaris, DFS-DCE/AIX Storage DLFM (Data Links File Manager) Figure 2: DataLinks Architecture Control Path for DataLinks Integrity Archive Server DLFM_DB (metadata) Data Links Manager on File server where the file system is located. Figure 2 shows the architecture of DataLinks in DB2 UDB. The datalink engine provides a new SQL data type called DATALINK. A DATALINK value is a reference (in the form of a URL) to a file residing in a file system. A variety of options can be specified in the definition of a DATALINK column. These options determine the level of control exercised by the RDBMS over the files referenced by URLs stored in the column. Using these options it is possible to specify whether referential integrity

3 must be guaranteed for file references; whether read and write access to the referenced files should be controlled by the database or the file system; whether coordinated recovery of the database and the referenced files is to be supported by the system. When reference to a file is stored in a DATALINK column (e.g. using SQL INSERT), the file is said to be linked. The act of committing the transaction which creates a link to a file establishes control of the RDBMS over the file. As long as the file remains linked, the system enforces RDBMS control over the file as specified by the options in the DATALINK column definition. In order to enforce these controls, some actions are needed to be done on the file server. For example, the read and write access permissions or the owner of the file may need to be changed; the DLFM metadata may need to be updated to indicate that the file is linked. The datalink engine requests the DLM to perform these actions when linking a file. All these actions must be done in the context of the RDBMS transaction which created the link to ensure consistency. Therefore, transactions which manipulate DATALINK columns involve updating data on multiple file servers in addition to updating data in the database itself - essentially they are distributed transactions. DataLinks uses a twophase commit protocol for these transactions. The datalink engine acts as a coordinator and the DLMs acts as participants in this protocol. Likewise, deleting the reference (e.g. using SQL DELETE) will cause the RDBMS to relinquish control over that file. The file is then said to be unlinked. The action of unlinking is also done in the context of a distributed transaction. The Data Links Manager itself comprises of two sub-components: Data Links File Manager (DLFM) and Data Links Filesystem Filter (DLFF). The DLFM executes various requests from datalink engine. It maintains the metadata like which files are linked to the database and what level of control is desired for each of these. The DLFF is a control layer on the top of the native file system. It intercepts some file system operations (for example, delete, rename, open) to help enforce desired controls by the RDBMS. However, it does not interfere with read/write path so that performance of these operations is not affected. The DLFM and the DLFF together enforce the level of control specified when defining the DATALINK column. For example, if a column definition specifies that referential integrity is required for linked files, the DLFF will disallow rename or delete operations on files linked to that column; if it specifies that read/write access to linked files is to be controlled by the database, the DLFF disallows read/write access unless a valid token obtained from the RDBMS (using an SQL SELECT) is used when accessing the file. The DLFF itself is stateless, it consults the DLFM to find whether a file is linked and the level of control to be enforced. Recovery utilities are an important part of RDBMS products. DB2 UDB s backup utility takes snapshot of a database. The database can be restored to that snpashot state using the restore utility. DataLinks extends the ability of these utilities so that backup and restore of referenced files is also done along with the database data in a coordinated way. If the DATALINK column definition specifies that coordinated recovery is desired, the DLM initiates archival of a file when it is linked. The archiving operation is asynchronous with respect to the transaction that creates the link. The DLM thus keeps archive copies of files. When restore utility is used to reinstate a particular snapshot of the database, the corresponding versions of the referenced files will be reinstated too. This ensures that the file data is always consistent with the database data. The datalink engine and the DLMs coordinate with each other to achieve this functionality. Files residing on multiple file servers can be referenced from a single database. Conversely, multiple databases can reference files on one file server. Additional details on DataLinks technology can be found in [3]. DataLinks technology extends SQL language definition. These extensions have been standardized in ISO as a part of SQL99. The standard is presently in the Final Draft International Standard (FDIS) state [4]. The final International Standard (IS) is expected to be published in early DataLinks thus enables management of file data through standard SQL interface. It enhances recovery utilities in DB2 UDB to extend their reach to file data. Thus recovery of both database data and file data is coordinated through a single, common interface. 3. BENEFITS OF DATALINKS TO CONTENT MANAGEMENT SYSTEMS In a Content Management System, maintaining consistency between metadata server and resource manager is difficult because of two problems: 1. Updates, such as creation, deletion of objects and modification of their content, must be done in a coordinated fashion in the context of a single distributed transaction 2. Recovery operations must be coordinated Achieving (1) requires distributed transaction management and crash recovery techniques. Achieving (2) requires complex recovery techniques. Commercially available Content Management Systems have either simply not addressed these problems or have built custom software on their own. However, with advances in database technology, it is possible to exploit RDBMS capabilities to address these problems. DataLinks technology incorporates these capabilities in the DB2 UDB RDBMS product. It also provides the capability to implement uniform access control for metadata as well as files. Standard SQL mechanisms can thus be used to achieve access control using rules based on metadata. Architecture of DataLinks in DB2 UDB makes it particularly suitable as a basis for implementing the storage model required in Content Management Systems. The DB2 UDB engine will manage the metadata server. The Data Links Manager(s) residing on the resource manager(s) will cooperate with the DB2 UDB engine to provide integrity, recovery and access control. Figure 3 shows how DataLinks components fit in the triangle architecture. By using DataLinks in DB2 UDB, Content Management Systems can rely on DB2 UDB s robust capabilities for integrity, recovery and access control, rather than reinventing the wheel. The specific advantages achieved by using DataLinks are explained in detail in the

4 subsequent sections. 3.1 Integrity Existence of metadata server and resource manager as two Metadata Server DB2 engine Client DB2 DLM Resource Manager Figure 3:The Triangle Architecture with DataLinks components independent components poses the difficult problem of maintaining integrity between these two. For example, without a distributed transaction management mechanism, files in the resource manager can be deleted or renamed, leaving dangling references from the metadata server; the data in these files can be modified making the index information in the metadata server invalid. Thus there is a need to coordinate updates to these independent entities. DataLinks in DB2 UDB addresses these problems by providing both referential integrity and data integrity. Using SQL in DB2 UDB, the metadata information and the reference can be created in a single transaction. The action of creating file references in the metadata server also ensures the existence of these files and all this is done atomically in the context of a single transaction. Existence of the file in the resource manager is guaranteed as long as it is linked to the metadata server. The DLFF, in conjunction with the DLFM, disallows any file rename or delete operations which will violate referential integrity constraints. The deletion of the data in metadata server and deletion of the referenced file can also be done atomically, in a single transaction. DataLinks thus guarantees referential integrity between metadata server and resource manager. Data integrity is achieved by allowing only controlled updates to linked files. An update operation of the file is not considered complete unless an SQL update is done to the reference in the metadata server. This provides a mechanism to atomically perform the two actions - (i) completing the update of the file and (ii) updating the index information in the metadata server. For example, a DATALINK column definition can specify that integrity is required for all references, read and write access is to be controlled by the database and that point-in-time recovery is required. The steps involved in updating a file linked to this column will be: 1. Use SQL SELECT to search and obtain a particular file reference from the database. This reference will have a write token embedded in it. 2. Use the file reference with the embedded token to open the file for writing. DataLinks can optionally block any readers on that file after the file is opened for write. 3. Use the file system API to update the file content. 4. Perform an SQL UPDATE to update the file reference with itself to declare the operation to be complete. The file is considered to be in update-in-progress state until this SQL UPDATE is done. Any meta information that needs to be updated in the database can also be updated in the same transaction. Thus a new version of the file and the corresponding meta information can both be created atomically in the same transaction. Since the column definition specifies point-in-time recovery, the previous version of the file is maintained by the DLM. Therefore, changes to the content can instead be rolled back using slightly different SQL in Step 4 above. Using DataLinks in DB2 UDB, Content Management Systems are relieved of implementing complex distributed transaction management techniques themselves. They can rely on DB2 UDB s robust transactional capabilities to achieve integrity. 3.2 Backup and Recovery In response to any damage or corruption, the recovery of both metadata server and resource manager should be synchronized. Recovery of the metadata server data should automatically lead to the recovery of the referenced files at the various resource managers. This involves coordination of backup of metadata server database with the backup of the reference files at the resource managers. This also involves rebuilding of these data should they be damaged or corrupted in some way. Current implementations of Content Management Systems either do not support coordinated backup and recovery of the metadata and data at the various resource managers or they support it in their own proprietary way without the feature being provided through a RDBMS. Our solution is to exploit coordinated backup and recovery feature built within an RDBMS so as to take full advantages of single point of administration. When files on a resource manager are linked, they are scheduled for copying asynchronously to the transaction that links (inserts) them. The files are copied to an archive server (disk, IBM TSM etc). Backup of the metadata database is coordinated with its resource managers to ensure that by the time a metadata server backup (online or off-line) is successfully completed, the corresponding files at all the resource managers have also been backed up. Rebuilding of data is done through restoring from a previous database backup and reapplying changes as indicated in the database log. This also ensures that the files at the active resource managers are also restored to the proper versions as referred to by the metadata. Thus the metadata is synchronized with the files at resource managers. 3.3 Access Control

5 Different Content Management Systems have different mechanisms to provide access control to files residing in the resource manager. One example, as given in Section 1, is IBM Content Manager, in which all data requests are sent to a central metadata server where the access control is performed. The request is then forwarded to the resource manager and finally the data is delivered to the clients on a given port. This provides a centralized solution to simplify administration. However, this model may not be suitable in other situations, where users want to control when and how the data is delivered. Each access to the resource manager requires sending a request to the metadata server. Sometimes, due to the network condition, users may want to avoid multiple trips to the metadata server for any repeat access to files in the resource manager. Another approach is to allow direct access to the resource manager. This model provides the flexibility of when and how users access files in the resource manager. However, this usually requires building another layer on top of the native system to check against the access model in the metadata server because the access model provided by the native system cannot be directly mapped to the one in the metadata server. For example, the access model used in RDBMS can be defined through the use of SQL View. The definition of SQL View can contain arbitrary predicate. This provides more flexibility. On the other hand, the access model used in the file system is typically based on an Access Control List (ACL) associated with a file. It is less flexible because the access model is changed only when the ACL is altered. With DataLinks technology, the access model that is defined in the RDBMS can be extended and applied to files residing in the resource manager. This is achieved through the token mechanism. Unless a user has authority to fetch the DATALINK value from the table, no token will be generated. The token becomes a ticket to carry the authority for accessing a file that is referenced by a DATALINK value. Access to the file (either read or write) is granted only when a valid token is provided. The token is generated at runtime when querying a DATALINK column from an SQL table. It is embedded inside the returned name of the DATALINK value. Suppose the file name without a token is the DATALINK value returned from the table will be (including the token) Instead of providing the filename in the file open call, a user supplies the whole name including the token. The DLFF (described in section 2) will intercept the open call and validate the token. If the token is valid, the DLFF will let the open call proceed. Therefore, the access model defined in the RDBMS for controlling access to the metadata can be used to control access to files in the resource manager as well. No extra access control mechanism is required in the resource manager. Files can be accessed through any native file system interface or protocol. New features provided by the native system can be easily exploited by the applications. Moreover, assuming the communication channel is secure, by passing the token, the authorized user can designate another user to access the file. This user does not need to be registered to the system. It is useful in the Web environment where connection is ad hoc and session-less. Apart from using the RDBMS control via the token mechanism, while defining a DATALINK column, other levels of access control are also available, such as retaining the access model defined in the file system. In this case, a plain filename will be returned in a query against the DATALINK column. The access model will follow what is defined for the file in the file system. 3.4 Replication Access performance may be a concern when dealing with metadata and files in the content management system. This can happen when files are big and the number of users is large. By incrementally replicating both metadata and files in the content management system to multiple instances, load balancing is achieved. Replication not only helps in the load balancing situation, but also in other areas, such as providing a hot standby system and enabling data sharing among different physical locations and business partners. Nevertheless, most of the replication technology is available only to the metadata residing in the RDBMS. If users want to replicate both data in the metadata server and files in the resource manager, an external mechanism is required to be implemented on the top of whatever provided by the RDBMS. However, with DataLinks Replication technology, the replication of the metadata and the external referenced files can be handled by the RDBMS in a transactional fashion. The technology is built into the DB2 data replication product, called DB2 DataPropagator. DB2 DataPropagator uses the database log to capture changes to any registered SQL table or view in the source RDBMS and then externalize the changes in a staging table. When the replication cycle is triggered (either by an event or a timer), the staging table will be examined to locate the committed changes and then propagate them to the subscribed table in the target RDBMS. For DATALINK value, before the metadata is propagated to the table, the referenced file gets copied first from the source file system to the target file system. The new file reference is used when propagating the metadata to the target table. As a result, a DATALINK reference is established to the file which is just copied to the target RDBMS. By using DataLinks, no external mechanism is needed to handle the replication of external files in the resource manager separately. Both data in the metadata server and files in the resource manager can be replicated to the target system in a synchronized and consistent way. 4. FUTURE WORK There are many other useful features for the Digital Library which can be considered for the future release of the DataLinks

6 Technology. One of them is to support other nontraditional object storage systems. DataLinks currently supports several popular file systems, such as AIX JFS, NFS, Solaris UFS, DCE/DFS and NTFS. The support can be extended to other storage systems, such as Hierarchical Storage Management (HSM) system and video streaming server. Moreover, the interface to the DataLinks File Manager can be externalized to allow other vendors to integrate their object storage servers with DataLinks. In such case, the DATALINK value no longer necessarily refers to a physical location of a file, but rather provides a logical reference to an object. Another enhancement is to provide object creation support through SQL. With the existing DataLinks technology, users can do modification and deletion of the files within the SQL scope. However, a file still needs to be created before it can be linked to a DATALINK column. A function can be added to allow creation of the file during the linking process if the file does not exist. Therefore, the whole life cycle of files can be totally captured under the control of the DataLinks. [7] IBM, 5. CONCLUSIONS Access control, integrity and recovery are essential functions for managing content in Digital Libraries. Due to the lack of these functions for semi-structured and unstructured data in RDBMS, Digital Library products had to build custom solutions. This paper described how DataLinks technology provides each of these functions inside RDBMS. We believe that Digital Libraries can greatly benefit from synergistic integration with these advanced RDBMS functions. This helps avoid building and maintaining custom solutions for above mentioned features. Moreover, by relying on standard RDBMS functions, they can also leverage other DataLinks features like replication. 6. ACKNOWLEDGMENTS The authors would like to thank Hui-I Hsiao and Inderpal Narang for their valuable comments during the preparation of this paper. The authors would also like to thank all the people who have contributed to DataLinks technology over the last few years. 7. REFERENCES [1] DB2 Magazine, "Controlling the Digital Deluge: IBM Content Manager", Blaine Lucyk, summer [2] IBM, DataLinks: Managing External Data With DB2 Universal Database, White paper prepared by Judith R. Davis for IBM Corporation, February [3] H. Hsiao and I. Narang, DLFM: A Transactional Resource Manager, Proc. ACM SIGMOD Conf., Dallas, Texas, May 14-19, [4] ISO/IEC :2000, Information technology - Database Languages - SQL - Part 9: Management of External Data (SQL/MED) [5] D. M. Choy, C. Dwork, et al, "A Digital Library System for Periodicals Distribution", Forum on Advances in Digital Libraries - ADL'96 [6] M. Papiani, J. Weson, A. Dunlop, and D. Nicole, A distributed Scientific Archive Using the Web, XML and SQL/MED, ACM SIGMOD Record, Vol. 28, No. 3, September 1999.

DLFM: A Transactional Resource Manager

DLFM: A Transactional Resource Manager DLFM: A Transactional Resource Manager Hui-I Hsiao Inderpal Narang IBM Almaden Research Center San Jose, CA 95120 Email: hhsiao@almaden.ibm.com; narang@almaden.ibm.com Abstract The DataLinks technology

More information

Data Links. Managing Files Using DB2. Front cover. ibm.com/redbooks. Understand the Data Links architecture, unleashed for the first time

Data Links. Managing Files Using DB2. Front cover. ibm.com/redbooks. Understand the Data Links architecture, unleashed for the first time Front cover Data Links Managing Files Using DB2 Understand the Data Links architecture, unleashed for the first time Explore planning, migration, the Reconcile utility, and recovery Learn about HSM and

More information

Web Asset Integrity Solution demo -- LinkIntegrity+

Web Asset Integrity Solution demo -- LinkIntegrity+ Nagraj Alur e-business application characteristics Data Links technology Web Asset Integrity Solution demo -- LinkIntegrity+ Conclusions Supporting foils Please visit the Data Links website http://www.almaden.ibm.com/cs/datalinks/

More information

IBM Research Report. Data Consistency in a Loosely Coupled Transaction Model

IBM Research Report. Data Consistency in a Loosely Coupled Transaction Model RJ 10232 (A0202-020) February 20, 2002 Computer Science IBM Research Report Data Consistency in a Loosely Coupled Transaction Model Suparna Bhattacharya IBM Software Lab Golden Enclave Airport Road Bangalore

More information

SMD149 - Operating Systems - File systems

SMD149 - Operating Systems - File systems SMD149 - Operating Systems - File systems Roland Parviainen November 21, 2005 1 / 59 Outline Overview Files, directories Data integrity Transaction based file systems 2 / 59 Files Overview Named collection

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

Alfresco 2.1. Backup and High Availability Guide

Alfresco 2.1. Backup and High Availability Guide Copyright (c) 2007 by Alfresco and others. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic

More information

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

A Close-up Look at Potential Future Enhancements in Tivoli Storage Manager

A Close-up Look at Potential Future Enhancements in Tivoli Storage Manager A Close-up Look at Potential Future Enhancements in Tivoli Storage Manager Dave Cannon Tivoli Storage Manager Architect Oxford University TSM Symposium September 2005 Disclaimer This presentation describes

More information

Technical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

Technical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract Technical Note Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell/EMC storage solutions, based on the Microsoft SQL Server

More information

Teiid Designer User Guide 7.5.0

Teiid Designer User Guide 7.5.0 Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata

More information

Technical Note. Abstract

Technical Note. Abstract Technical Note Dell PowerEdge Expandable RAID Controllers 5 and 6 Dell PowerVault MD1000 Disk Expansion Enclosure Solution for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note

More information

B.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION. Ch. 1 :- Introduction Database Management System - 1

B.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION. Ch. 1 :- Introduction Database Management System - 1 Basic Concepts :- 1. What is Data? Data is a collection of facts from which conclusion may be drawn. In computer science, data is anything in a form suitable for use with a computer. Data is often distinguished

More information

UNIT I. Introduction

UNIT I. Introduction UNIT I Introduction Objective To know the need for database system. To study about various data models. To understand the architecture of database system. To introduce Relational database system. Introduction

More information

DB2. Migration Guide. DB2 Version 9 GC

DB2. Migration Guide. DB2 Version 9 GC DB2 DB2 Version 9 for Linux, UNIX, and Windows Migration Guide GC10-4237-00 DB2 DB2 Version 9 for Linux, UNIX, and Windows Migration Guide GC10-4237-00 Before using this information and the product it

More information

Chapter One. Concepts BACKUP CONCEPTS

Chapter One. Concepts BACKUP CONCEPTS Chapter One 1 Concepts Backup and recovery is not a single, discrete subject, but a collection of methods, strategies, and procedures to protect the data in your database and provide a means of recovery

More information

Heckaton. SQL Server's Memory Optimized OLTP Engine

Heckaton. SQL Server's Memory Optimized OLTP Engine Heckaton SQL Server's Memory Optimized OLTP Engine Agenda Introduction to Hekaton Design Consideration High Level Architecture Storage and Indexing Query Processing Transaction Management Transaction Durability

More information

4. CONTAINER DATABASE OBJECT ORIENTED DESIGN

4. CONTAINER DATABASE OBJECT ORIENTED DESIGN 32 4. CONTAINER DATABASE OBJECT ORIENTED DESIGN We propose an Object-oriented design for the Container Database. The abstraction itself is not necessarily dependent on OO technologies nor do we claim it

More information

Database Management System. Fundamental Database Concepts

Database Management System. Fundamental Database Concepts Database Management System Fundamental Database Concepts CONTENTS Basics of DBMS Purpose of DBMS Applications of DBMS Views of Data Instances and Schema Data Models Database Languages Responsibility of

More information

Installing and Administering a Satellite Environment

Installing and Administering a Satellite Environment IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00

More information

Database Management System 9

Database Management System 9 Database Management System 9 School of Computer Engineering, KIIT University 9.1 Relational data model is the primary data model for commercial data- processing applications A relational database consists

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

SQL. History. From Wikipedia, the free encyclopedia.

SQL. History. From Wikipedia, the free encyclopedia. SQL From Wikipedia, the free encyclopedia. Structured Query Language (SQL) is the most popular computer language used to create, modify and retrieve data from relational database management systems. The

More information

IBM Spectrum Protect Node Replication

IBM Spectrum Protect Node Replication IBM Spectrum Protect Node Replication. Disclaimer IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding

More information

DELL POWERVAULT NX3500 INTEGRATION WITHIN A MICROSOFT WINDOWS ENVIRONMENT

DELL POWERVAULT NX3500 INTEGRATION WITHIN A MICROSOFT WINDOWS ENVIRONMENT DELL POWERVAULT NX3500 INTEGRATION WITHIN A MICROSOFT WINDOWS ENVIRONMENT A Dell Technology White Paper Version 1.0 THIS TECHNOLOGY WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Storage Industry Resource Domain Model

Storage Industry Resource Domain Model Storage Industry Resource Domain Model A Technical Proposal from the SNIA Technical Council Topics Abstract Data Storage Interfaces Storage Resource Domain Data Resource Domain Information Resource Domain

More information

MySQL 8.0: Atomic DDLs Implementation and Impact

MySQL 8.0: Atomic DDLs Implementation and Impact MySQL 8.0: Atomic DDLs Implementation and Impact Ståle Deraas, Senior Development Manager Oracle, MySQL 26 Sept 2017 Copyright 2017, Oracle and/or its its affiliates. All All rights reserved. Safe Harbor

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

MTA Database Administrator Fundamentals Course

MTA Database Administrator Fundamentals Course MTA Database Administrator Fundamentals Course Session 1 Section A: Database Tables Tables Representing Data with Tables SQL Server Management Studio Section B: Database Relationships Flat File Databases

More information

Microsoft SQL Server

Microsoft SQL Server Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents

More information

Flex2SQL. Contents. Mertech s ISAM to SQL Database Connectivity (ISDBC) Drivers For DataFlex

Flex2SQL. Contents. Mertech s ISAM to SQL Database Connectivity (ISDBC) Drivers For DataFlex MERTECH DATA SYSTEMS, INC. 18503 Pines Boulevard, Suite 312 Pembroke Pines, Florida 33029 USA Tel: (954)585-9016 Fax: (866)228-1213 www.mertechdata.com Contents Overview Product Fact Sheet Interaction

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

Technical White Paper

Technical White Paper Technical White Paper On Implementing IBM InfoSphere Change Data Capture for Sybase with a Remote Database Server Awajeet Kumar Arya(awajarya@in.ibm.com) CONTENTS Trademarks...03 Introduction...04 Overview...04

More information

EMC Documentum xdb. High-performance native XML database optimized for storing and querying large volumes of XML content

EMC Documentum xdb. High-performance native XML database optimized for storing and querying large volumes of XML content DATA SHEET EMC Documentum xdb High-performance native XML database optimized for storing and querying large volumes of XML content The Big Picture Ideal for content-oriented applications like dynamic publishing

More information

Chapter 2. DB2 concepts

Chapter 2. DB2 concepts 4960ch02qxd 10/6/2000 7:20 AM Page 37 DB2 concepts Chapter 2 Structured query language 38 DB2 data structures 40 Enforcing business rules 49 DB2 system structures 52 Application processes and transactions

More information

"Out of the Box" Workflow Simplicity Data Access Using PPDM in a Multi-Vendor Environment

Out of the Box Workflow Simplicity Data Access Using PPDM in a Multi-Vendor Environment "Out of the Box" Workflow Simplicity Data Access Using PPDM in a Multi-Vendor Environment W. Brian Boulmay Director, Business Partners Fall 2010 Abstract Proper conversion of unit and coordinate reference

More information

Relational Database Systems Part 01. Karine Reis Ferreira

Relational Database Systems Part 01. Karine Reis Ferreira Relational Database Systems Part 01 Karine Reis Ferreira karine@dpi.inpe.br Aula da disciplina Computação Aplicada I (CAP 241) 2016 Database System Database: is a collection of related data. represents

More information

Database Management System Dr. S. Srinath Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Dr. S. Srinath Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Dr. S. Srinath Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 13 Constraints & Triggers Hello and welcome to another session

More information

TSM Paper Replicating TSM

TSM Paper Replicating TSM TSM Paper Replicating TSM (Primarily to enable faster time to recoverability using an alternative instance) Deon George, 23/02/2015 Index INDEX 2 PREFACE 3 BACKGROUND 3 OBJECTIVE 4 AVAILABLE COPY DATA

More information

Veeam Endpoint Backup

Veeam Endpoint Backup Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Brief History of SQL. Relational Database Management System. Popular Databases

Brief History of SQL. Relational Database Management System. Popular Databases Brief History of SQL In 1970, Dr. E.F. Codd published "A Relational Model of Data for Large Shared Data Banks," an article that outlined a model for storing and manipulating data using tables. Shortly

More information

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information.

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information. Prof- Neeta Bonde DBMS (FYCS) Unit - 1 DBMS: - Database is a collection of related data and data is a collection of facts and figures that can be processed to produce information. Mostly data represents

More information

BookKeeper overview. Table of contents

BookKeeper overview. Table of contents by Table of contents 1...2 1.1 BookKeeper introduction...2 1.2 In slightly more detail...2 1.3 Bookkeeper elements and concepts... 3 1.4 Bookkeeper initial design... 3 1.5 Bookkeeper metadata management...

More information

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS INTRODUCTION The ability to create and manage snapshots is an essential feature expected from enterprise-grade storage systems. This capability

More information

Table of Contents. Introduction 3

Table of Contents. Introduction 3 1 Table of Contents Introduction 3 Data Protection Technologies 4 Btrfs File System Snapshot Technology How shared folders snapshot works Custom Scripting for Snapshot Retention Policy Self-Service Recovery

More information

Stale Data and Groups

Stale Data and Groups CONTENTS Stale Data and Groups Overview... 1 Traditional/Manual Approaches... 1 Which data is stale?... 1 Which Security Groups are No Longer in Use?... 2 Varonis Approaches... 2 Varonis DatAdvantage Identifies

More information

Systems Analysis and Design in a Changing World, Fourth Edition. Chapter 12: Designing Databases

Systems Analysis and Design in a Changing World, Fourth Edition. Chapter 12: Designing Databases Systems Analysis and Design in a Changing World, Fourth Edition Chapter : Designing Databases Learning Objectives Describe the differences and similarities between relational and object-oriented database

More information

Consistency and Replication 1/62

Consistency and Replication 1/62 Consistency and Replication 1/62 Replicas and Consistency??? Tatiana Maslany in the show Orphan Black: The story of a group of clones that discover each other and the secret organization Dyad, which was

More information

Tintri Cloud Connector

Tintri Cloud Connector TECHNICAL WHITE PAPER Tintri Cloud Connector Technology Primer & Deployment Guide www.tintri.com Revision History Version Date Description Author 1.0 12/15/2017 Initial Release Bill Roth Table 1 - Revision

More information

Teiid Designer User Guide 7.7.0

Teiid Designer User Guide 7.7.0 Teiid Designer User Guide 1 7.7.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata

More information

Oracle Streams. An Oracle White Paper October 2002

Oracle Streams. An Oracle White Paper October 2002 Oracle Streams An Oracle White Paper October 2002 Oracle Streams Executive Overview... 3 Introduction... 3 Oracle Streams Overview... 4... 5 Staging... 5 Propagation... 6 Transformations... 6 Consumption...

More information

DocAve 6 High Availability

DocAve 6 High Availability DocAve 6 High Availability User Guide Service Pack 8, Cumulative Update 1 Issued December 2016 1 Table of Contents What s New in This Guide...6 About DocAve High Availability...7 Submitting Documentation

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

Configuring IBM Spectrum Protect for IBM Spectrum Scale Active File Management

Configuring IBM Spectrum Protect for IBM Spectrum Scale Active File Management IBM Spectrum Protect Configuring IBM Spectrum Protect for IBM Spectrum Scale Active File Management Document version 1.4 Dominic Müller-Wicke IBM Spectrum Protect Development Nils Haustein EMEA Storage

More information

COMP 3400 Mainframe Administration 1

COMP 3400 Mainframe Administration 1 COMP 3400 Mainframe Administration 1 Christian Grothoff christian@grothoff.org http://grothoff.org/christian/ 1 These slides are based in part on materials provided by IBM s Academic Initiative. 1 Databases

More information

Course Introduction & Foundational Concepts

Course Introduction & Foundational Concepts Course Introduction & Foundational Concepts CPS 352: Database Systems Simon Miner Gordon College Last Revised: 8/30/12 Agenda Introductions Course Syllabus Databases Why What Terminology and Concepts Design

More information

EMC DiskXtender for Windows and EMC RecoverPoint Interoperability

EMC DiskXtender for Windows and EMC RecoverPoint Interoperability Applied Technology Abstract This white paper explains how the combination of EMC DiskXtender for Windows and EMC RecoverPoint can be used to implement a solution that offers efficient storage management,

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Volume Shadow Copy Service Guide r11.5 D01191-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for

More information

Distributed KIDS Labs 1

Distributed KIDS Labs 1 Distributed Databases @ KIDS Labs 1 Distributed Database System A distributed database system consists of loosely coupled sites that share no physical component Appears to user as a single system Database

More information

TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1

TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 ABSTRACT This introductory white paper provides a technical overview of the new and improved enterprise grade features introduced

More information

Database Assessment for PDMS

Database Assessment for PDMS Database Assessment for PDMS Abhishek Gaurav, Nayden Markatchev, Philip Rizk and Rob Simmonds Grid Research Centre, University of Calgary. http://grid.ucalgary.ca 1 Introduction This document describes

More information

Part I: Structured Data

Part I: Structured Data Inf1-DA 2011 2012 I: 24 / 117 Part I Structured Data Data Representation: I.1 The entity-relationship (ER) data model I.2 The relational model Data Manipulation: I.3 Relational algebra I.4 Tuple relational

More information

Nexsan Assureon 8.2. Product Release Notes for Nexsan Assureon. Release Date: July 2017

Nexsan Assureon 8.2. Product Release Notes for Nexsan Assureon. Release Date: July 2017 Nexsan Assureon 8.2 Product Release Notes for Nexsan Assureon Release Date: July 2017 Note: Certain changes of a proprietary or cosmetic nature are not necessarily listed. Contents: System requirements

More information

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product

More information

Data Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases

Data Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases Manageability and availability for Oracle RAC databases Overview Veritas Storage Foundation for Oracle RAC from Symantec offers a proven solution to help customers implement and manage highly available

More information

WORLD WIDE NEWS GATHERING AUTOMATIC MANAGEMENT

WORLD WIDE NEWS GATHERING AUTOMATIC MANAGEMENT WORLD WIDE NEWS GATHERING AUTOMATIC MANAGEMENT Luís Veiga and Paulo Ferreira {luis.veiga, paulo.ferreira } @ inesc.pt INESC, Rua Alves Redol, 9 - Lisboa -1000 Lisboa - Portugal Abstract The world-wide-web

More information

Veritas NetBackup 6.5 Clients and Agents

Veritas NetBackup 6.5 Clients and Agents Veritas NetBackup 6.5 Clients and Agents The Veritas NetBackup Platform Next-Generation Data Protection Overview Veritas NetBackup provides a simple yet comprehensive selection of innovative clients and

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

C Q&As. IBM Tivoli Storage Manager V7.1 Implementation. Pass IBM C Exam with 100% Guarantee

C Q&As. IBM Tivoli Storage Manager V7.1 Implementation. Pass IBM C Exam with 100% Guarantee C2010-511 Q&As IBM Tivoli Storage Manager V7.1 Implementation Pass IBM C2010-511 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

DocAve 6 High Availability

DocAve 6 High Availability DocAve 6 High Availability User Guide Service Pack 10, Cumulative Update 1 Issued April 2018 The Enterprise-Class Management Platform for SharePoint Governance Table of Contents What s New in This Guide...

More information

Database Systems. Sven Helmer. Database Systems p. 1/567

Database Systems. Sven Helmer. Database Systems p. 1/567 Database Systems Sven Helmer Database Systems p. 1/567 Chapter 1 Introduction and Motivation Database Systems p. 2/567 Introduction What is a database system (DBS)? Obviously a system for storing and managing

More information

Technical White Paper HP Access Control Upgrade Guide. August 2017

Technical White Paper HP Access Control Upgrade Guide. August 2017 Technical White Paper HP Access Control Upgrade Guide Table of contents 1 Introduction... 5 2 Preparation... 5 2.1 Where to obtain the current HP AC software... 5 2.2 Where to obtain HP AC documentation...

More information

Lecture 01. Fall 2018 Borough of Manhattan Community College

Lecture 01. Fall 2018 Borough of Manhattan Community College Lecture 01 Fall 2018 Borough of Manhattan Community College 1 2 Introduction A database (DB) is a collection of related data. A database management system (DBMS) is the software that manages and controls

More information

ITTIA DB SQL Em bedded Dat abase and VxWorks

ITTIA DB SQL Em bedded Dat abase and VxWorks ITTIA DB SQL Em bedded Dat abase and VxWorks Copyright 2017 ITTIA L.L.C. An ITTIA White Paper, August 2017 ITTIA DB SQL TM is a small-footprint, high-performance relational database engine for embedded

More information

August Oracle - GoldenGate Statement of Direction

August Oracle - GoldenGate Statement of Direction August 2015 Oracle - GoldenGate Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your

More information

Integrity: Do You Know Where Your Objects Are?

Integrity: Do You Know Where Your Objects Are? 11 Integrity: Do You Know Where Your Objects Are? Andrew E. Wade, Ph.D. Objectivity, Inc. drew@objy.com Abstract ODBMSs can support wonderful features, but what does it matter how fancy the versioned,

More information

Service Oriented Architectures (ENCS 691K Chapter 2)

Service Oriented Architectures (ENCS 691K Chapter 2) Service Oriented Architectures (ENCS 691K Chapter 2) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud

More information

20762B: DEVELOPING SQL DATABASES

20762B: DEVELOPING SQL DATABASES ABOUT THIS COURSE This five day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server 2016 database. The course focuses on teaching individuals how to

More information

What is Data? ANSI definition: Volatile vs. persistent data. Data. Our concern is primarily with persistent data

What is Data? ANSI definition: Volatile vs. persistent data. Data. Our concern is primarily with persistent data What is Data? ANSI definition: Data ❶ A representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automatic means.

More information

What is Data? Volatile vs. persistent data Our concern is primarily with persistent data

What is Data? Volatile vs. persistent data Our concern is primarily with persistent data What is? ANSI definition: ❶ A representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automatic means. ❷ Any

More information

DQpowersuite. Superior Architecture. A Complete Data Integration Package

DQpowersuite. Superior Architecture. A Complete Data Integration Package DQpowersuite Superior Architecture Since its first release in 1995, DQpowersuite has made it easy to access and join distributed enterprise data. DQpowersuite provides an easy-toimplement architecture

More information

Vendor: IBM. Exam Code: C Exam Name: DB DBA for Linux UNIX and Windows. Version: Demo

Vendor: IBM. Exam Code: C Exam Name: DB DBA for Linux UNIX and Windows. Version: Demo Vendor: IBM Exam Code: C2090-611 Exam Name: DB2 10.1 DBA for Linux UNIX and Windows Version: Demo QUESTION 1 Due to a hardware failure, it appears that there may be some corruption in database DB_1 as

More information

10. Replication. CSEP 545 Transaction Processing Philip A. Bernstein. Copyright 2003 Philip A. Bernstein. Outline

10. Replication. CSEP 545 Transaction Processing Philip A. Bernstein. Copyright 2003 Philip A. Bernstein. Outline 10. Replication CSEP 545 Transaction Processing Philip A. Bernstein Copyright 2003 Philip A. Bernstein 1 Outline 1. Introduction 2. Primary-Copy Replication 3. Multi-Master Replication 4. Other Approaches

More information

Ecient Redo Processing in. Jun-Lin Lin. Xi Li. Southern Methodist University

Ecient Redo Processing in. Jun-Lin Lin. Xi Li. Southern Methodist University Technical Report 96-CSE-13 Ecient Redo Processing in Main Memory Databases by Jun-Lin Lin Margaret H. Dunham Xi Li Department of Computer Science and Engineering Southern Methodist University Dallas, Texas

More information

High Availability- Disaster Recovery 101

High Availability- Disaster Recovery 101 High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com

More information

Example Implementations of File Systems

Example Implementations of File Systems Example Implementations of File Systems Last modified: 22.05.2017 1 Linux file systems ext2, ext3, ext4, proc, swap LVM Contents ZFS/OpenZFS NTFS - the main MS Windows file system 2 Linux File Systems

More information

EMC SourceOne for File Systems

EMC SourceOne for File Systems EMC SourceOne for File Systems Version 7.2 Administration Guide 302-000-958 REV 02 Copyright 2005-2015 EMC Corporation. All rights reserved. Published in the USA. Published December 9, 2015 EMC believes

More information

CLOUD-SCALE FILE SYSTEMS

CLOUD-SCALE FILE SYSTEMS Data Management in the Cloud CLOUD-SCALE FILE SYSTEMS 92 Google File System (GFS) Designing a file system for the Cloud design assumptions design choices Architecture GFS Master GFS Chunkservers GFS Clients

More information

Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data

Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data June 2006 Note: This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality,

More information

WHITE PAPER. Recovery of a Single Microsoft Exchange 2000 Database USING VERITAS EDITION FOR MICROSOFT EXCHANGE 2000

WHITE PAPER. Recovery of a Single Microsoft Exchange 2000 Database USING VERITAS EDITION FOR MICROSOFT EXCHANGE 2000 WHITE PAPER Recovery of a Single Microsoft Exchange 2000 Database USING VERITAS EDITION FOR MICROSOFT EXCHANGE 2000 June, 2003 1 TABLE OF CONTENTS Overview...3 Background...3 Traditional Backup Processes...4

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Slides are slightly modified by F. Dragan Database System Concepts, 5th Ed. See www.db-book.com for conditions on re-use Chapter 1: Introduction Purpose of Database Systems View

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8 ADVANCED MYSQL REPLICATION ARCHITECTURES Luís

More information

Kubuntu Installation:

Kubuntu Installation: Kubuntu Installation: Kubuntu is a user friendly operating system based on KDE, the K Desktop Environment. With a predictable 6 month release cycle and part of the Ubuntu project, Kubuntu is the GNU/Linux

More information

Distributed Databases

Distributed Databases Distributed Databases Chapter 22.6-22.14 Comp 521 Files and Databases Spring 2010 1 Final Exam When Monday, May 3, at 4pm Where, here FB007 What Open book, open notes, no computer 48-50 multiple choice

More information

REFERENCE ARCHITECTURE. Rubrik and Nutanix

REFERENCE ARCHITECTURE. Rubrik and Nutanix REFERENCE ARCHITECTURE Rubrik and Nutanix TABLE OF CONTENTS INTRODUCTION - RUBRIK...3 INTRODUCTION - NUTANIX...3 AUDIENCE... 4 INTEGRATION OVERVIEW... 4 ARCHITECTURE OVERVIEW...5 Nutanix Snapshots...6

More information

Sql Server Syllabus. Overview

Sql Server Syllabus. Overview Sql Server Syllabus Overview This SQL Server training teaches developers all the Transact-SQL skills they need to create database objects like Tables, Views, Stored procedures & Functions and triggers

More information

GFS: The Google File System. Dr. Yingwu Zhu

GFS: The Google File System. Dr. Yingwu Zhu GFS: The Google File System Dr. Yingwu Zhu Motivating Application: Google Crawl the whole web Store it all on one big disk Process users searches on one big CPU More storage, CPU required than one PC can

More information

Panzura White Paper Panzura Distributed File Locking

Panzura White Paper Panzura Distributed File Locking Panzura White Paper Panzura Distributed File Locking Panzura s game-changing Freedom Family of Products finally brings the full power and benefits of cloud storage to enterprise customers, helping to break

More information

What is wrong with PostgreSQL? OR What does Oracle have that PostgreSQL should? Richard Stephan

What is wrong with PostgreSQL? OR What does Oracle have that PostgreSQL should? Richard Stephan What is wrong with PostgreSQL? OR What does Oracle have that PostgreSQL should? Richard Stephan PostgreSQL is an Enterprise RDBMS Schemas, Roles, Accounts Tablespace Management Table Partitioning Write-Ahead

More information

A GPFS Primer October 2005

A GPFS Primer October 2005 A Primer October 2005 Overview This paper describes (General Parallel File System) Version 2, Release 3 for AIX 5L and Linux. It provides an overview of key concepts which should be understood by those

More information